MF (minority first) scheme for defeating distributed denial of service attacks
暂无分享,去创建一个
[1] Kevin R. Fall,et al. Ns: notes and documentation , 1997 .
[2] Ratul Mahajan,et al. Controlling high bandwidth aggregates in the network , 2002, CCRV.
[3] Srinivasan Keshav,et al. An Engineering Approach to Computer Networking: ATM Networks , 1996 .
[4] David K. Y. Yau,et al. Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles , 2005, IEEE/ACM Transactions on Networking.
[5] Yakov Rekhter,et al. A Provider Architecture for Differentiated Services and Traffic Engineering (PASTE) , 1998, RFC.
[6] Stuart Harvey Rubin,et al. Distributed denial of service attacks , 2000, Smc 2000 conference proceedings. 2000 ieee international conference on systems, man and cybernetics. 'cybernetics evolving to systems, humans, organizations, and their complex interactions' (cat. no.0.
[7] Sven Dietrich,et al. Analyzing Distributed Denial of Service Tools: The Shaft Case , 2000, LISA.
[8] Paul Ferguson,et al. Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing , 1998, RFC.
[9] George Varghese,et al. Efficient fair queueing using deficit round robin , 1995, SIGCOMM '95.
[10] Anna R. Karlin,et al. Network support for IP traceback , 2001, TNET.
[11] Kevin J. Houle,et al. Trends in Denial of Service Attack Technology , 2001 .
[12] Andrew B. Whinston,et al. Defeating distributed denial of service attacks , 2000 .
[13] Steven M. Bellovin,et al. ICMP Traceback Messages , 2003 .